Skip to content

Commit 8092ee5

Browse files
authored
chore(protocol): remove repetitive words in audit report (#18584)
Signed-off-by: RiceChuan <[email protected]>
1 parent 3687c4e commit 8092ee5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

packages/protocol/audit/code4rena-2024-03-taiko-final-report.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -670,7 +670,7 @@ Notice how if the payment is in ERC20 tokens, the payee will be the variable \_m
670670

671671
1. proposer A approves the assignmentHook contract to spend a portion of their tokens, the allowance is set higher than the actual fee they will be paying.
672672
2. proposer A proposes a block, and a fee is charged and payed to the assigned prover, but there remains allowance that the assignment hook contract can still use.
673-
3. proposer B proposes a block and sets params.coinbase as the the address of proposer A.
673+
3. proposer B proposes a block and sets params.coinbase as the address of proposer A.
674674
4. proposer A address will be the payee of the fee for the assigned prover for the block proposed by proposer B.
675675

676676
The scenario above describes how someone can be forced maliciously to pay fees for block proposals by other actors.
@@ -1207,7 +1207,7 @@ When this function is called to un-suspend a message we set `proofReceipt[msgHas
12071207

12081208
`bridge_watchdog` can therefore forge arbitrary messages and have them treated as proven by first suspending them and then un-suspending them.
12091209

1210-
`bride_watchdog` is supposed to only be able to ban and suspend messages, in the expected worst case `bridge_watchdog` is limited to DDOSing messages and bans until governance removes the the `bridge_watchdog`.
1210+
`bride_watchdog` is supposed to only be able to ban and suspend messages, in the expected worst case `bridge_watchdog` is limited to DDOSing messages and bans until governance removes the `bridge_watchdog`.
12111211

12121212
With the privilege escalation shown here the role can instead drain the bridge of all ETH and tokens.
12131213

0 commit comments

Comments
 (0)